First published: Wed Sep 27 2017(Updated: )
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20170927-cip is rated as high due to the potential for denial of service (DoS) attacks.
To fix cisco-sa-20170927-cip, upgrade to a version of Cisco IOS Software that includes the security patches for the Common Industrial Protocol (CIP) vulnerabilities.
Devices running vulnerable versions of Cisco IOS Software that implement the Common Industrial Protocol (CIP) feature are affected by cisco-sa-20170927-cip.
cisco-sa-20170927-cip exposes systems to unauthenticated remote denial of service (DoS) attacks.
No, cisco-sa-20170927-cip can be exploited by unauthenticated attackers.